Research explorer tool

Date


People

Download Available

358 results

Analyzing Objective and Subjective Data in Social Sciences: Implications for Smart Cities

Journal Article
Erhan, L., Ndubuaku, M., Ferrara, E., Richardson, M., Sheffield, D., Ferguson, F. J., …Liotta, A. (2019)
Analyzing Objective and Subjective Data in Social Sciences: Implications for Smart Cities. IEEE Access, 7, 19890-19906. https://doi.org/10.1109/access.2019.2897217
The ease of deployment of digital technologies and the Internet of Things gives us the opportunity to carry out large-scale social studies and to collect vast amounts of data ...

A Cooperative Learning Approach for the Quadratic Knapsack Problem

Conference Proceeding
Lalla-Ruiz, E., Segredo, E., & Voß, S. (2018)
A Cooperative Learning Approach for the Quadratic Knapsack Problem. In Learning and Intelligent Optimization Conference (LION12). , (31-35). https://doi.org/10.1007/978-3-030-05348-2_3
The Quadratic Knapsack Problem (QKP) is a well-known optimization problem aimed to maximize a quadratic objective function subject to linear capacity constraints. It has sever...

A supervised energy monitoring-based machine learning approach for anomaly detection in a clean water supply system

Conference Proceeding
Robles-Durazno, A., Moradpoor, N., McWhinnie, J., & Russell, G. (2018)
A supervised energy monitoring-based machine learning approach for anomaly detection in a clean water supply system. In Proceedings of the IEEE International Conference on Cyber Security and Protection of Digital Services (Cyber Security 2018)https://doi.org/10.1109/CyberSecPODS.2018.8560683
Industrial Control Systems are part of our daily life in industries such as transportation, water, gas, oil, smart cities, and telecommunications. Technological development ov...

Short-long term anomaly detection in wireless sensor networks based on machine learning and multi-parameterized edit distance

Journal Article
Cauteruccio, F., Fortino, G., Guerrieri, A., Liotta, A., Mocanu, D. C., Perra, C., …Torres Vega, M. (2019)
Short-long term anomaly detection in wireless sensor networks based on machine learning and multi-parameterized edit distance. Information Fusion, 52, 13-30. https://doi.org/10.1016/j.inffus.2018.11.010
Heterogeneous wireless sensor networks are a source of large amount of different information representing environmental aspects such as light, temperature, and humidity. A ver...

Interference graphs to monitor and control schedules in low-power WPAN

Journal Article
van der Lee, T., Liotta, A., & Exarchakos, G. (2019)
Interference graphs to monitor and control schedules in low-power WPAN. Future Generation Computer Systems, 93, 111-120. https://doi.org/10.1016/j.future.2018.10.014
Highlights • This study presents the complete and slotted interference graph model. • The service uses the complete interference graph to evaluate the network. • Slotted int...

A Survey of Limitations and Enhancements of the IPv6 Routing Protocol for Low-power and Lossy Networks: A Focus on Core Operations

Journal Article
Ghaleb, B., Al-Dubai, A. Y., Ekonomou, E., Alsarhan, A., Nasser, Y., Mackenzie, L. M., & Boukerche, A. (2018)
A Survey of Limitations and Enhancements of the IPv6 Routing Protocol for Low-power and Lossy Networks: A Focus on Core Operations. Communications Surveys and Tutorials, IEEE Communications Society, https://doi.org/10.1109/COMST.2018.2874356
Driven by the special requirements of the Low-power and Lossy Networks (LLNs), the IPv6 Routing Protocol for LLNs (RPL) was standardized by the IETF some six years ago to tack...

Collaborative Computing: Networking, Applications and Worksharing: 13th International Conference, CollaborateCom 2017, Edinburgh, UK, December 11–13, 2017, Proceedings

Conference Proceeding
(2018)
Collaborative Computing: Networking, Applications and Worksharing: 13th International Conference, CollaborateCom 2017, Edinburgh, UK, December 11–13, 2017, Proceedings. In I. Romdhani, L. Shu, H. Takahiro, Z. Zhou, T. Gordon, & D. Zeng (Eds.), Collaborative Computing: Networking, Applications and Worksharinghttps://doi.org/10.1007/978-3-030-00916-8
This book constitutes the thoroughly refereed proceedings of the 13th International Conference on Collaborative Computing: Networking, Applications, and Worksharing, Collabora...

Vulnerability Assessment of Objective Function of RPL Protocol for Internet of Things

Conference Proceeding
Semedo, F., Moradpoor, N., & Rafiq, M. (2018)
Vulnerability Assessment of Objective Function of RPL Protocol for Internet of Things. In SIN '18 Proceedings of the 11th International Conference on Security of Information and Networkshttps://doi.org/10.1145/3264437.3264438
The Internet of Things (IoT) can be described as the ever-growing global network of objects with built-in sensing and communication interfaces such as sensors, Global Position...

Virtualizing the real: a virtual reality contemporary sculpture park for children

Journal Article
Flint, T., Hall, L., Stewart, F., & Hagan, D. (2018)
Virtualizing the real: a virtual reality contemporary sculpture park for children. Digital Creativity, 29(2/3), 191-207. https://doi.org/10.1080/14626268.2018.1511601
This paper discusses a virtual reality experience for a contemporary sculpture park, Jupiter Artland, developed in Minecraft targeting 9-11-year-old children. Issues of fideli...

A Secured Data Management Scheme for Smart Societies in Industrial Internet of Things Environment

Journal Article
Babar, M., Khan, F., Iqbal, . W., Yahya, A., Arif, F., Tan, Z., & Chuma, J. (2018)
A Secured Data Management Scheme for Smart Societies in Industrial Internet of Things Environment. IEEE Access, 6, 43088-43099
Smart societies have an increasing demand for quality-oriented services and infrastructure in an Industrial Internet of Things (IIoT) paradigm. Smart urbanization faces numero...